Follow
Chen Wang
Title
Cited by
Cited by
Year
Wireless sensing for human activity: A survey
J Liu, H Liu, Y Chen, Y Wang, C Wang
IEEE Communications Surveys & Tutorials 22 (3), 1629-1645, 2019
2532019
Friend or foe? Your wearable devices reveal your personal pin
C Wang, X Guo, Y Wang, Y Chen, B Liu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
1612016
Fine-grained sleep monitoring: Hearing your breathing with smartphones
Y Ren, C Wang, J Yang, Y Chen
2015 IEEE Conference on Computer Communications (INFOCOM), 1194-1202, 2015
1242015
User authentication on mobile devices: Approaches, threats and trends
C Wang, Y Wang, Y Chen, H Liu, J Liu
Computer Networks 170, 107118, 2020
1002020
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration
J Liu, C Wang, Y Chen, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
952017
Towards in-baggage suspicious object detection using commodity wifi
C Wang, J Liu, Y Chen, H Liu, Y Wang
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
642018
Locating rogue access point using fine-grained channel information
C Wang, X Zheng, Y Chen, J Yang
IEEE Transactions on Mobile Computing 16 (9), 2560-2573, 2016
452016
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations
C Wang, SA Anand, J Liu, P Walker, Y Chen, N Saxena
Proceedings of the 35th Annual Computer Security Applications Conference, 42-56, 2019
382019
Accurate rogue access point localization leveraging fine-grained channel information
X Zheng, C Wang, Y Chen, J Yang
2014 IEEE conference on communications and network security, 211-219, 2014
332014
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
302021
Signature verification using critical segments for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
IEEE Transactions on Mobile Computing 19 (3), 724-739, 2019
292019
Personal PIN leakage from wearable devices
C Wang, X Guo, Y Chen, Y Wang, B Liu
IEEE Transactions on Mobile Computing 17 (3), 646-660, 2017
282017
Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
arXiv preprint arXiv:1907.05972, 2019
272019
Critical segment based real-time e-signature for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
2015 IEEE Conference on Communications and Network Security (CNS), 7-15, 2015
242015
Noninvasive fine-grained sleep monitoring leveraging smartphones
Y Ren, C Wang, Y Chen, J Yang, H Li
IEEE Internet of Things Journal 6 (5), 8248-8261, 2019
232019
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
C Shi, Y Wang, Y Chen, N Saxena, C Wang*
Annual Computer Security Applications Conference, 829-842, 2020
22*2020
Wristspy: Snooping passcodes in mobile payment using wrist-worn wearables
C Wang, J Liu, X Guo, Y Wang, Y Chen
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2071-2079, 2019
212019
Systems and methods for user input and authentication using vibration analysis
C YingYing, J Liu, C Wang, N Saxena
US Patent 11,461,442, 2022
192022
WiEat: Fine-grained device-free eating monitoring leveraging Wi-Fi signals
Z Lin, Y Xie, X Guo, Y Ren, Y Chen, C Wang
2020 29th International Conference on Computer Communications and Networks …, 2020
182020
Poster: Hearing your breathing: fine-grained sleep monitoring using smartphones
Y Ren, C Wang, Y Chen, J Yang
Proceedings of the 20th annual international conference on Mobile computing …, 2014
172014
The system can't perform the operation now. Try again later.
Articles 1–20